LogMeIn support sites no longer support Microsoft's Internet Explorer (IE) browser. Please use a supported browser to ensure all features perform as they should (Chrome / FireFox / Edge).

The GoTo support site no longer supports Safari 15. Please upgrade your browser to Safari 16 (or newer) or switch to a supported browser such as Google Chrome, Mozilla Firefox, or Microsoft Edge.

Discover what our all-in-one IT solution can do for your business. Get LogMeIn Resolve free.

We are currently experiencing an unplanned outage for this product. Service Status
  • Support
  • Products

    Explore support by product

    GoTo Connect

    All-in-one phone, meeting and messaging software

    GoTo Meeting

    Video and audio meeting software

    GoTo Webinar

    All-in-one webinar and virtual events software

    GoTo Room

    Conference room hardware

    GoTo Training

    Online training software

    OpenVoice

    Audio conferencing software

    Grasshopper

    Lightweight virtual phone system

    join.me

    Video conferencing software

    LogMeIn Resolve

    IT management & support

    LogMeIn Resolve MDM

    Mobile device management

    LogMeIn Pro

    Remote device access

    LogMeIn Central

    Remote monitoring & management

    LogMeIn Rescue

    Remote IT support

    GoToMyPC

    Remote desktop access

    GoToAssist

    Remote support software

    Hamachi

    Hosted VPN service

    RemotelyAnywhere

    On-prem remote access solution
  • Community
  • Trainings
  • Service Status
  • Try the improved My Cases portal

    Easily manage your ticket, track its status, contact us from an existing case, and more.

    Sign in to try
  • Language selector icon Language selector icon
    • English
    • Français
    • Italiano
    • Deutsch
    • Español
    • Português
    • Nederlands
  • Contact Support
  • Service Status
  • User Avatar User Avatar
    • Support
    • Contact Support
    • Browse Products
    • Service Status
    • Community
    • Trainings
    • Sign in
    • User Avatar
    • My Account
    • Personal Info
    • Sign In & Security
    • My Cases
    • Billing Center
    • https://link.goto.com/myaccount-billing
    • My GoTo Connect
    • My Meetings
    • My Webinars
    • My Trainings
    • My Conferences
    • My Resolutions
    • My Mobile Devices
    • My Sessions
    • My Sessions
    • My Incidents
    • Sign out

product logo
Back button image Back
Back button image

LogMeIn Resolve HIPAA Compliance Guide

  • About this document
  • Technical safeguards § 164.312
  • Frequently Asked Questions

The healthcare industry has benefited greatly from the ability to receive remote support from technology providers and internal IT departments. However, since the computers being serviced often contain confidential patient data, many remote support products inadvertently put patient privacy at risk, especially if the data is sent or made accessible over unsecured networks such as the Internet.

For this reason, the Health Insurance Portability and Accountability Act (HIPAA) calls for privacy and security standards that protect the confidentiality and integrity of patient health information. Specifically, if you transmit patient data across the Internet, your remote support products and security architecture must provide end-to-end encryption so the data cannot be intercepted by anyone other than the intended recipient. In addition, the remote support products and network must provide access control to allow viewing only by authorized people.

About this document

This publication provides a brief introduction to the scope of HIPAA compliance with regard to remote access products.

Section A outlines key background information needed to understand the scope of HIPAA compliance with regard to remote access products.

Section B outlines the HIPAA rules’ Technical Safeguards (see § 164.312), which apply to remote access products used by entities subject to HIPAA compliance.

Sections C through H show how GoTo helps organizations adhere to, meet, or exceed these safeguards.

Important: The information contained in this document is provided to you "AS IS" and does not constitute legal advice or an opinion regarding GoTo's HIPAA compliance. GoTo makes no claims, promises or guarantees about the accuracy, completeness, or adequacy of the information contained in or referenced in this document. GoTo recommends that you seek the advice of competent legal counsel before relying on any of the statements contained in this document.

Healthcare applications

Authorized technology providers and IS/IT staff can use LogMeIn Resolve patented web-based screen-sharing technology to instantly and securely view PC and Mac desktops and provide remote assistance to healthcare workers from any location connected to the web. Unlike other remote-support solutions, LogMeIn Resolve does not distribute actual data across networks. Rather, by using screen-sharing technology, security is strengthened because only mouse and keyboard commands are transmitted. LogMeIn Resolve further protects data confidentiality through a combination of encryption, strong access control and computer protection methods.

Security, control and customization

Support administrators have the option of assigning representatives to groups defined by the features to which they are granted access. Some features may be disabled by an administrator to customize the level of security that is appropriate for your organization. Because the security features are built in, administrators can rest easy: Security cannot be weakened by inexperienced users.

Encryption

LogMeIn Resolve employs industry standard end-to-end Advanced Encryption Standard (AES) encryption using 128-bit keys to protect the data stream, file transfers, chat and keyboard and mouse input. Additional built-in security features such as strong passwords, end-to-end user authentication and unique session connection codes ensure data confidentiality. LogMeIn Resolve encryption fully complies with HIPAA Security Standards to ensure the security and privacy of patient data.

Technical safeguards § 164.312

Standards covered entities must implement Implementation specifications R=Required A=Addressable Key factors Support in LogMeIn Resolve
(a)(1) Access Control   R Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to authorized persons or software programs.
  • PC and Mac access is 100% permission based and the customer retains overriding control at all times.
  • Representatives and managers must log in using strong passwords to access the LogMeIn Resolve solution.
  • Technicians running LogMeIn Resolve as a service must log in with the proper credentials of a local or domain administrator
Unique User Identification R Assign a unique name and/ or number for identifying and tracking user identity. Representatives and administrators are identified by using their unique email address as their log-in name.
Encryption and Decryption A Implement a mechanism to encrypt and decrypt electronic protected health information.
  • All sensitive chat, session and control data transmitted across the network is protected using the Advanced Encryption Standard (AES), FIPS 197.
  • A unique 128-bit AES encryption key is generated at the start of each session
(b) Audit Controls   R Implement hardware, software and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.
  • All connection and session activity through our distributed network service infrastructure is logged for security and quality-of-service purposes.
  • All remote-support sessions, chat, diagnostics and customer feedback can be recorded and archived on LogMeIn Resolve servers.
(c)(1) Integrity   A Implement policies and procedures to protect electronic protected health information from improper alteration or destruction.
  • Integrity protection mechanisms in LogMeIn Resolve are designed to ensure a high degree of data and service integrity, working independently of any integrity controls that may already exist on the customer’s computers and internal data systems.
  • Customer has complete overriding control of all keyboard and mouse activity.
(c)(1) Integrity Mechanism Mechanism to authenticate electronic protected health information. A Implement methods to corroborate that information has not been destroyed or altered.
  • All session data is compressed using proprietary lossless compression techniques and protected using HMAC-SHA1 message authentication codes.
  • Numerous additional structural integrity checks are made on the decrypted session data after it is received to ensure data and service integrity.
  • Session recording, if enabled, would show if any data was inadvertently affected by the remote-support session.
(d) Person or Entity Authentication   R Verify that the person or entity seeking access is the one claimed.
  • Access to LogMeIn Resolve is protected by a strong password and a unique user log-in ID.
  • Representatives must be approved and set up by an administrator before they can access client computers.
(e)(1) Transmission Security   R Implement policies and procedures to protect electronic protected health information from improper alteration or destruction.
  • Integrity protection mechanisms in LogMeIn Resolve are designed to ensure a high degree of data and service integrity, working independently of any integrity controls that may already exist on the customer’s computers and internal data systems.
  • Customer has complete overriding control of all keyboard and mouse activity.
Integrity Controls R Ensure that protected health information is not improperly modified without detection.
  • All session data is compressed using proprietary lossless compression techniques and protected using HMAC-SHA1 message authentication codes.
  • Numerous additional checks are made on the decrypted session data after it is received to ensure network transmission integrity.
Encryption R Encrypt protected health information whenever deemed appropriate.
  • All sensitive chat, session, file transfer and service control data transmitted across the network is protected using AES (FIPS 197) in counter mode.
  • A unique 128-bit AES encryption key is generated at the start of each session.

Frequently Asked Questions

What are the general requirements of the HIPAA Security Standards?
(Ref: § 164.306 Security Standards: General Rules)
Covered entities must do the following:
  • Ensure the confidentiality, integrity and availability of all electronic protected health information the covered entity creates, receives, maintains or transmits.
  • Protect against any reasonably anticipated threats or hazards to the security or integrity of such information.
  • Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required under the privacy regulations.
  • Ensure compliance with this subpart by its workforce.
How are covered entities expected to address these requirements?
Covered entities may use any security measures that reasonably and appropriately implement the standards; however, covered entities must first take into account the risks to protected electronic information; the organization’s size, complexity and existing infrastructure; and costs. The final rule includes three “safeguards” sections outlining standards (what must be done) and “implementation specifications” (how it must be done) that are either “required” or “addressable.”

If “required,” it must be implemented to meet the standard; if “addressable,” a covered entity can implement it, implement an equivalent measure or do nothing (documenting why it would not be reasonable and appropriate).

  • Administrative Safeguards: Policies and procedures, workforce security and training, evaluations and business associate contracts.
  • Physical Safeguards: Facility access, workstation security and device and media controls.
  • Technical Safeguards: Access control, audit controls, data integrity, authentication and transmission security
What are you doing to help customers address HIPAA regulations?
To facilitate our customers’ compliance with HIPAA security regulations, we’re providing detailed information about the security safeguards we have implemented into the LogMeIn Resolve service. This information is provided in several forms, including security white papers, service-specific HIPAA-compliance matrices and other technical collateral. Additionally, our staff are available to provide guidance and assistance in all deployments.
Is LogMeIn Resolve HIPAA compliant?
Only “covered entities” (e.g. healthcare organizations) are required to comply with HIPAA. Because of the technical and security measures employed by the service, when used properly, LogMeIn Resolve can help covered entities fulfil their HIPAA compliance obligations. For example, the administrative configuration and control features provided with LogMeIn Resolve help maintain healthcare organization compliance with the Administrative and Physical Safeguards sections of the final HIPAA Security Rules. The net result is that LogMeIn Resolve may be confidently deployed as a remote-support component of a larger information-management system without affecting HIPAA compliance.
What is the best way to deploy LogMeIn Resolve in an environment subject to HIPAA regulations?
Just as HIPAA allows considerable latitude in the choice of how to implement security safeguards, a single set of guidelines is not applicable for all deployments. Organizations should carefully review all configurable security features of LogMeIn Resolve in the context of their specific environments, user population and policy requirements to determine which features should be enabled and how best to configure.
Article last updated: 5 September, 2025

Need help?

Contact icon Contact support
Manage Cases icon Manage cases
Community icon Ask the Community
Training icon Attend trainings
Video icon Watch videos
  • Language selector icon Language selector icon
    • English
    • Français
    • Italiano
    • Deutsch
    • Español
    • Português
    • Nederlands
  • About Us
  • Terms of Service
  • Privacy Policy
  • Trademark
  • Do Not Sell or Share My Personal Info
  • Browse Products
  • Copyright © 2025 GoTo Group, Inc. All rights reserved

Collaboration Products

GoTo Connect

GoTo Meeting

GoTo Webinar

GoTo Training

join.me

Grasshopper

OpenVoice

Remote Solutions Products

GoTo Resolve

Rescue

GoToAssist

Access Products

Pro

Central

GoToMyPC